CVE-2025-67030
Published: 25 March 2026
Description
Directory Traversal vulnerability in the extractFile method of org.codehaus.plexus.util.Expand in plexus-utils before 6d780b3378829318ba5c2d29547e0012d5b29642. This allows an attacker to execute arbitrary code
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely patching of the vulnerable plexus-utils library to the fixing commit, eliminating the directory traversal vulnerability.
Requires validation of inputs to the extractFile method to block malicious path traversal attempts leading to arbitrary code execution.
Enables vulnerability scanning to identify and prioritize the plexus-utils directory traversal flaw for remediation.
Security SummaryAI
CVE-2025-67030 is a directory traversal vulnerability (CWE-22) in the extractFile method of the org.codehaus.plexus.util.Expand class within the plexus-utils library, affecting versions prior to the commit 6d780b3378829318ba5c2d29547e0012d5b29642. Published on 2026-03-25, this flaw carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
An unauthenticated attacker accessible over the network can exploit this vulnerability with low complexity, though it requires user interaction. Successful exploitation enables arbitrary code execution on the target system, compromising confidentiality, integrity, and availability with high impact.
Mitigation involves updating plexus-utils to the fixing commit 6d780b3378829318ba5c2d29547e0012d5b29642 or later, as detailed in the project's GitHub repository. Related discussions and pull requests, including issue #294 and pulls #295 and #296, provide further context on the patch and resolution.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directory traversal in archive extraction enables arbitrary code execution via crafted malicious files processed by vulnerable applications, directly facilitating Exploitation for Client Execution (T1203).